Stay away from Conan.

Chapter 2409 Infiltrating the Core Area

Now, the organization has the fingerprints of its codenamed members and their corresponding ID cards. If they want to enter the core area of ​​this pharmaceutical factory and pass through that door, the only thing missing is facial recognition...

Of course, there's no need to go through the normal verification process to get past that door, but if you use other methods, you'll not only lack the tools, but you also don't know if it will cause other problems.

Therefore, relatively speaking, it might be safer to go through the normal verification process, and besides, it's not something I can't do myself.

It's just a human face; I can try to disguise myself to deal with it.

Moreover, to be honest, in Gao Yuan's impression, given the technological level of this era, the so-called facial recognition algorithms have significant problems. When he was in university, he was specifically conducting security assessments on this type of technology and he was convinced that many so-called facial recognition systems could actually be fooled by a single photo in the early days, making them completely unsecured.

Therefore, considering the current technical level of the organization's internal ID cards, where even the information recorded on them can be so easily cracked, it's clear that the seemingly advanced technology here may actually be just for show. Otherwise, there would be no need to set up so many verification methods for the doors.

Thinking about this, Gao Yuan couldn't help but feel that he might be able to give it a try—

After all, making a vodka mask to fool the facial recognition system would be time-consuming and laborious, and his current mask-making skills were not at the level of Kaito Kuroba and his group. Therefore, this method of making masks in a short time was immediately rejected by Takato.

The remaining question is whether the facial recognition system here is actually easy to fool with photos or similar things.

Just as Gao Yuan was pondering this, preparing to retrieve the front view of the vodka from the surveillance video to use as a key item for cracking the facial recognition system, at that moment, he saw a researcher in a white coat walk up to the surveillance video facing the metal door and start operating the system next to the door.

Thus, being able to actually witness the authentication process of the door's authentication system was extremely valuable for Gao Yuan. Therefore, he couldn't help but zoom in on the screen and carefully examine the process—

Although the process is largely the same, it only gives you a general idea of ​​what the certification process is like. But since we've come across this, there's no harm in taking a look. Maybe we can discover some problems through this ongoing certification process.

In the surveillance footage, the researcher appeared to first take out an ID card and stick it onto the authentication system to verify his identity. Then, he placed his hand on the device, presumably to authenticate his fingerprint.

After completing the entire process, it should then jump to the facial recognition process. The researcher in the video straightens his hair, stands in front of the system's camera, and has his identity confirmed by the system's authentication.

At first glance, there seemed to be nothing noteworthy in the image, but soon, Gao Yuan noticed a clue on the computer screen in front of him—

What he saw was the video of what appeared to be the facial recognition verification process being transmitted directly to the computer in front of him. A program then ran in the background, and finally, a program interface appeared on Gao Yuan's computer. Undoubtedly, this was the image of the researcher facing the camera, along with a photo of his ID card next to him. However, the system seemed to have doubts about the result because there were some differences between the ID card photo and the person being verified. Therefore, the system immediately transferred the case to a manual review process!

Upon seeing this scene, Gao Yuan was momentarily stunned. Then, without thinking, he operated the interface and clicked "confirm" on the manual review screen. Immediately afterward, the door in the monitoring screen opened, and the researcher entered through the door!
Having witnessed the entire process firsthand, Gao Yuan was immediately left speechless, feeling a bit foolish for having overthought so much of the situation.

Because, clearly, Gao Yuan completely overestimated the performance of this facial recognition authentication system.

Based on his observations and experience with related systems, Gao Yuan could determine that the system's operating logic was as follows: when someone was undergoing facial recognition, the system would take a picture of the person being recognized in front of the camera, and then compare the photo with the person's ID photo already stored in the system.

If the details of the portraits in the two photos match, then the comparison is successful. If there are discrepancies, the comparison is transferred to manual review. This is the system logic...

Generally speaking, this kind of review logic is easy to fool the system with photos. However, it is clear that the people who set up the system have improved the standard precision of the algorithm logic. Content with significant deviations in certain details will not be approved and will be transferred to manual review. This is to avoid some people who try to use tricks to fool the system.

But this understanding of the underlying logic, and the fact that the manual review process was connected to the computer in front of him, immediately gave Gao Yuan a plan—

Since any issues during the final facial recognition process will be handled by a human reviewer, and I am currently the only human reviewer here, there is no doubt that as long as I pass the ID card and fingerprint verifications, I can pass the third facial recognition verification without any worries.

In other words, the facial recognition system for this door is actually only meant to prevent someone from using another person's ID card and fingerprint for verification. The actual system authentication is not very meaningful. Therefore, if this is the case…

Why not just directly access the system parameters yourself?
By hacking into the system and lowering the accuracy parameters of facial recognition, one can pass the system's authentication simply by using a photo.

With that in mind, Gao Yuan acted immediately. After retrieving Vodka's facial photo, he took a picture with his phone camera and then wrote some code on his computer so that from that moment on, all surveillance footage would be overwritten by the surveillance data from the same time yesterday, thus leaving no trace of himself in subsequent surveillance footage.

Having done all this, Gao Yuan quickly set off for the doorway.

The ID card was rewritten with information about vodka, along with vodka's fingerprints and then a photograph of vodka...

With all three certifications passed, Gao Yuan successfully opened the door to the organization's core internal laboratory... (End of Chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like